Broken access publishing

407 views

Published on

How to make your site incompatible with library-intermediated workflows. Some examples of real-life examples of how a set of authentication characteristics render access impossible, or at best lead to a licence breach.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
407
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Broken access publishing

  1. 1. Broken Access Publishing OR How to make your site incompatible with library-intermediated workflows Simon Inger, September 2013 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License
  2. 2. Discovery and Delivery Library Web Pages Resource Discovery, e.g. Primo, Summon, EDS Link Server/Resolver, e.g. SFX, Serials 360, EDS Target
  3. 3. Library Technology Components • Library web pages – Direct readers to the most appropriate place to start their content discovery • Resource Discovery Services (RDS) – (Primo, Summon, EDS, a.k.a. web scale discovery) – A&I are indexes of content and usually library- recommended – Libraries invested much in multi-subject RDS • Link server/resolver – Manages multiple incarnations of content
  4. 4. Journals and Monographs Library Web Pages Resource Discovery Link Server/Resolver Target
  5. 5. A&I Library Web Pages Resource Discovery Link Server/Resolver Target
  6. 6. Reference Library Web Pages Resource Discovery and Target Link Server/Resolver Secondary Target
  7. 7. Authentication Library Web Pages, sometimes authenticated Resource Discovery, authenticated Link Server/Resolver, often authenticated Target, often authenticated
  8. 8. Case study 1 – UK university • Preferred sign-in method for library is Shibboleth • Publisher supports Shibboleth • Publisher offers free alumni access if it can be monitored – Publisher does not support Shibboleth attributes (which would report alumni) – Publisher requires separate IP address • Library needs readers to use IP address access instead • Link server can only record one URL for each target, so on- site and off-site users have to use proxy – (Proxy is in another country or cloud based and invalidates publisher’s Google analytics) • Library finds it cannot get 2 IP addresses from proxy provider • Broken Access
  9. 9. Case study 2 – university in Oman • Entire country uses single IP gateway because of government censorship, so institutions indistinguishable • Preferred sign-in method for library is Shibboleth • Publisher supports Shibboleth • Resource Discovery Service does not support Shibboleth • Library needs readers to use IP address access instead, via a proxy • Publisher does not support proxies • Broken Access
  10. 10. Case 3 – hospital in South Africa • Whole regions of the medical sector in South Africa share IP addresses, so institutions indistinguishable • Many remote workers, often out in the field • Library not advanced enough for Shibboleth • Publisher supports off-site access and proxies, but licence demands that only off-site users use the proxy • Library’s only option anyway is to provide access for its patrons via a proxy – Library either breaches licence or doesn’t buy product • Broken Access
  11. 11. Access Planning
  12. 12. Shibboleth or Athens Reader •Unauth‐ enticated •External SSO •OpenID •Facebook •Google •Yahoo Library technology •Library web  pages •SSO •Proxy Externaldiscovery •Google •A&I Publisher •WAYF •WAYFless •IP •Content
  13. 13. WAYFless via library technology Reader •Unauth‐ enticated •External SSO •OpenID •Facebook •Google •Yahoo Library technology •Library web  pages •SSO •Proxy Externaldiscovery •Google •A&I Publisher •WAYF •WAYFless •IP •Content
  14. 14. WAYFless with external SSO Reader •Unauth‐ enticated •External SSO •OpenID •Facebook •Google •Yahoo Library technology •Library web  pages •SSO •Proxy Externaldiscovery •Google •A&I Publisher •WAYF •WAYFless •IP •Content
  15. 15. Proxy and IP Access Reader •Unauth‐ enticated •External SSO •OpenID •Facebook •Google •Yahoo Library technology •Library web  pages •SSO •Proxy Externaldiscovery •Google •A&I Publisher •WAYF •WAYFless •IP •Content
  16. 16. Proxy via local SSO Reader •Unauth‐ enticated •External SSO •OpenID •Facebook •Google •Yahoo Library technology •Library web  pages •SSO •Proxy Externaldiscovery •Google •A&I Publisher •WAYF •WAYFless •IP •Content
  17. 17. Open Access • This must all favour Open Access publishing, right? • Yes and No. • If, in an Open Access future, libraries stay intermediated, they are going to want to measure the utility of each title they link to, which means they will want usage statistics, which means the OA publisher will need to authenticate • BUT – authentication can be much lighter and is more likely to be compatible
  18. 18. Think How You Fit In, and Plan! Library Web Pages Resource Discovery, e.g. Primo, Summon, EDS Link Server/Resolver, e.g. SFX, Serials 360, EDS Target
  19. 19. Questions? simon@sic.ox14.com simon@renewtraining.com

×